Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Mont-Royal

Region: Quebec

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.39.148.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.39.148.93.			IN	A

;; AUTHORITY SECTION:
.			537	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060101 1800 900 604800 86400

;; Query time: 169 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 02 02:11:52 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 93.148.39.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 93.148.39.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.75.78.230 attack
Unauthorized connection attempt from IP address 177.75.78.230 on Port 445(SMB)
2019-07-02 05:39:53
165.227.140.123 attackbotsspam
Invalid user castis from 165.227.140.123 port 48180
2019-07-02 05:48:34
209.141.62.45 attackbotsspam
port scan and connect, tcp 22 (ssh)
2019-07-02 05:37:28
81.83.22.7 attackbotsspam
Jul  1 13:30:43 thevastnessof sshd[4284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.83.22.7
...
2019-07-02 05:17:44
89.96.203.25 attackspam
Jul  1 20:23:11 hermescis postfix/smtpd\[27466\]: NOQUEUE: reject: RCPT from mail.brunointerni.com\[89.96.203.25\]: 550 5.1.1 \: Recipient address rejected: bigfathog.com\; from=\ to=\ proto=ESMTP helo=\
2019-07-02 05:49:35
167.86.101.57 attackspam
Jul  1 20:02:20 hosting sshd[12697]: Invalid user hive from 167.86.101.57 port 55602
...
2019-07-02 05:25:56
191.242.76.219 attackbotsspam
Try access to SMTP/POP/IMAP server.
2019-07-02 05:17:14
120.27.114.224 attackbotsspam
repeated unsuccessful attempts to obtain Drupal author files (from WP site), e.g., /?author=5
2019-07-02 05:20:25
58.215.201.226 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 05:30:48
42.112.226.215 attack
Unauthorized connection attempt from IP address 42.112.226.215 on Port 445(SMB)
2019-07-02 05:32:12
185.248.160.231 attackspambots
Reported by AbuseIPDB proxy server.
2019-07-02 05:43:15
54.36.148.14 attack
Automatic report - Web App Attack
2019-07-02 05:39:08
82.142.173.230 attackbotsspam
Unauthorized connection attempt from IP address 82.142.173.230 on Port 445(SMB)
2019-07-02 05:29:02
219.248.137.8 attackspambots
2019-07-01T21:23:24.933197hub.schaetter.us sshd\[8702\]: Invalid user server from 219.248.137.8
2019-07-01T21:23:24.966791hub.schaetter.us sshd\[8702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.248.137.8
2019-07-01T21:23:27.323196hub.schaetter.us sshd\[8702\]: Failed password for invalid user server from 219.248.137.8 port 42291 ssh2
2019-07-01T21:27:34.679701hub.schaetter.us sshd\[8709\]: Invalid user qhsupport from 219.248.137.8
2019-07-01T21:27:34.714258hub.schaetter.us sshd\[8709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.248.137.8
...
2019-07-02 05:53:06
125.212.182.151 attackbots
Unauthorized connection attempt from IP address 125.212.182.151 on Port 445(SMB)
2019-07-02 05:41:57

Recently Reported IPs

78.118.121.25 60.36.6.229 124.93.89.167 42.81.252.236
92.222.14.166 214.241.186.150 217.47.241.231 69.55.193.252
156.131.9.204 62.236.48.159 208.16.28.70 98.95.148.189
18.16.87.137 163.19.39.208 196.158.198.83 80.158.194.223
184.111.164.206 101.90.21.104 198.174.159.138 175.120.58.56